954 resultados para OLAP operators
Resumo:
Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.
Resumo:
The Finnish legislation requires for a safe and secure learning environment. However, the comprehensive, risk based safety and security management (SSM) and the management commitment in the implementation and development of the SSM are not mentioned in the legislation. Multiple institutions, operators and researchers have studied and developed safety and security in educational institutions over the past decade. Typically the approach has been fragmented and without bringing up the importance of the comprehensive SSM. The development needs of the safety and security operations in universities have been studied. However, in universities of applied sciences (UASs) and in elementary schools (ESs), the performance level, strengths and weaknesses of the comprehensive SSM have not been studied. The objective of this study was to develop the comprehensive, risk based SSM of educational institutions by developing the new Asteri consultative auditing process and study its effects on auditees. Furthermore, the performance level in the comprehensive SSM in UASs and ESs were studied using Asteri and the TUTOR model developed by the Keski-Uusimaa Department for Rescue Services. In addition, strengths, development needs and differences were identified. In total, 76 educational institutions were audited between the years 2011 and 2014. The study is based on logical empiricism, and an observational applied research design was used. Auditing, observation and an electronic survey were used for data collection. Statistical analysis was used to analyze the collected information. In addition, thematic analysis was used to analyze the development areas of the organizations mentioned by the respondents in the survey. As one of the main contributions, this research presents the new Asteri consultative auditing process. Organizations with low performance levels on the audited subject benefit the most from the Asteri consultative auditing process. Asteri may be usable in many different types of audits, not only in SSM audits. As a new result, this study provides new knowledge on attitudes related to auditing. According to the research findings, auditing may generate negative attitudes and the auditor should take them into account when planning and preparing for audits. Negative attitudes can be compensated by producing added value, objectivity and positivity for the audit and, thus, improve the positive effects of auditing on knowledge and skills. Moreover, as the results of this study shows, auditing safety and security issues do not increase feelings of insecurity, but rather increase feelings of safety and security when using the new Asteri consultative auditing process with the TUTOR model. The results showed that the SSM in the audited UASs was statistically significantly more advanced than that in the audited ESs. However, there is still room for improvement in the ESs and the UASs as the approach to the SSM was fragmented. It can be assumed that the majority of Finnish UASs and ESs do not likely meet the basic level of the comprehensive, risk based the SSM.
Resumo:
In this bachelor’s thesis are examined the benefits of current distortion detection device application in customer premises low voltage networks. The purpose of this study was to find out if there are benefits for measuring current distortion in low-voltage residential networks. Concluding into who can benefit from measuring the power quality. The research focuses on benefits based on the standardization in Europe and United States of America. In this research, were also given examples of appliances in which current distortion detection device could be used. Along with possible illustration of user interface for the device. The research was conducted as an analysis of the benefits of current distortion detection device in residential low voltage networks. The research was based on literature review. The study was divided to three sections. The first explain the reasons for benefitting from usage of the device and the second portrays the low-cost device, which could detect one-phase current distortion, in theory. The last section discuss of the benefits of usage of current distortion detection device while focusing on the beneficiaries. Based on the result of this research, there are benefits from usage to the current distortion detection device. The main benefitting party of the current distortion detection device was found to be manufactures, as they are held responsible of limiting the current distortion on behalf of consumers. Manufactures could adjust equipment to respond better to the distortion by having access to on-going current distortion in network. The other benefitting party are system operators, who would better locate distortion issues in low-voltage residential network to start prevention of long-term problems caused by current distortion early on.
Resumo:
Transmission system operators and distribution system operators are experiencing new challenges in terms of reliability, power quality, and cost efficiency. Although the potential of energy storages to face those challenges is recognized, the economic implications are still obscure, which introduce the risk into the business models. This thesis aims to investigate the technical and economic value indicators of lithium-ion battery energy storage systems (BESS) in grid-scale applications. In order to do that, a comprehensive performance lithium-ion BESS model with degradation effects estimation is developed. The model development process implies literature review on lifetime modelling, use, and modification of previous study progress, building the additional system parts and integrating it into a complete tool. The constructed model is capable of describing the dynamic behavior of the BESS voltage, state of charge, temperature and capacity loss. Five control strategies for BESS unit providing primary frequency regulation are implemented, in addition to the model. The questions related to BESS dimensioning and the end of life (EoL) criterion are addressed. Simulations are performed with one-month real frequency data acquired from Fingrid. The lifetime and cost-benefit analysis of the simulation results allow to compare and determine the preferable control strategy. Finally, the study performs the sensitivity analysis of economic profitability with variable size, EoL and system price. The research reports that BESS can be profitable in certain cases and presents the recommendations.
Resumo:
Our objective is to develop a diffusion Monte Carlo (DMC) algorithm to estimate the exact expectation values, ($o|^|^o), of multiplicative operators, such as polarizabilities and high-order hyperpolarizabilities, for isolated atoms and molecules. The existing forward-walking pure diffusion Monte Carlo (FW-PDMC) algorithm which attempts this has a serious bias. On the other hand, the DMC algorithm with minimal stochastic reconfiguration provides unbiased estimates of the energies, but the expectation values ($o|^|^) are contaminated by ^, an user specified, approximate wave function, when A does not commute with the Hamiltonian. We modified the latter algorithm to obtain the exact expectation values for these operators, while at the same time eliminating the bias. To compare the efficiency of FW-PDMC and the modified DMC algorithms we calculated simple properties of the H atom, such as various functions of coordinates and polarizabilities. Using three non-exact wave functions, one of moderate quality and the others very crude, in each case the results are within statistical error of the exact values.
Resumo:
Ontario Editorial Bureau (O.E.B.)
Resumo:
Hub location problem is an NP-hard problem that frequently arises in the design of transportation and distribution systems, postal delivery networks, and airline passenger flow. This work focuses on the Single Allocation Hub Location Problem (SAHLP). Genetic Algorithms (GAs) for the capacitated and uncapacitated variants of the SAHLP based on new chromosome representations and crossover operators are explored. The GAs is tested on two well-known sets of real-world problems with up to 200 nodes. The obtained results are very promising. For most of the test problems the GA obtains improved or best-known solutions and the computational time remains low. The proposed GAs can easily be extended to other variants of location problems arising in network design planning in transportation systems.
Resumo:
Walter D’Arcy Ryan was born in 1870 in Kentville, Nova Scotia. He became the chief of the department of illumination at the General Electric Company of Schenectady, New York. He was a founder in the field of electrical illumination. He built the electric steam scintillator which had numerous nozzles and valves. The operator would release steam through the valves. The nozzles all had names which included: Niagara, fan, snake, plume, column, pinwheel and sunburst. The steam scintillator was combined with projectors, prismatic reflectors, flashers and filters to produce the desired effects. In 1920 a group of businessmen from Niagara Falls, New York formed a group who called themselves the “generators’. They lobbied the American and Canadian governments to improve the illumination of the Falls. They were able to raise $58, 000 for the purchase and installation of 24 arc lights to illuminate the Falls. On February 24th, 1925 the Niagara Falls Illumination Board was formed. Initially, the board had a budget of $28,000 for management, operation and maintenance of the lights. The power was supplied free by the Ontario Power Company. They had 24 lights installed in a row on the Ontario Power Company surge tank which was next to the Refectory in Victoria Park on the Canadian side. The official opening ceremony took place on June 8th, 1925 and included a light parade in Niagara Falls, New York and an international ceremony held in the middle of the Upper Steel Arch Bridge. Walter D’Arcy Ryan was the illuminating engineer and A.D. Dickerson who was his New York field assistant directed the scintillator. with information from American Technological Sublime by David E. Nye and the Niagara Falls info website Location: Brock University Archives Source Information: Subject Headings: Added Entries: 100 Ryan, W. D’A. |q (Walter D’Arcy), |d 1870-1934 610 General Electric Company 650 Lighting, Architectural and decorative 650 Lighting |z New York (State) |z Niagara Falls 700 Dickerson, A.F. 700 Schaffer, J.W. Related material held at other repositories: The Niagara Falls Museum in Niagara Falls, Ontario has a program (pamphlet) dedicating new lighting in 1958 and it has postcards depicting the illumination of the Falls. Some of Ryan’s accomplishments can be seen at The Virtual Museum of the City of San Francisco. Described by: Anne Adams Date: Sept 26,Upper Steel Arch Bridge. Walter D’Arcy Ryan was the illuminating engineer and A.D. Dickerson who was his New York field assistant directed the scintillator. with information from American Technological Sublime by David E. Nye and the Niagara Falls info website
Resumo:
This work investigates mathematical details and computational aspects of Metropolis-Hastings reptation quantum Monte Carlo and its variants, in addition to the Bounce method and its variants. The issues that concern us include the sensitivity of these algorithms' target densities to the position of the trial electron density along the reptile, time-reversal symmetry of the propagators, and the length of the reptile. We calculate the ground-state energy and one-electron properties of LiH at its equilibrium geometry for all these algorithms. The importance sampling is performed with a single-determinant large Slater-type orbitals (STO) basis set. The computer codes were written to exploit the efficiencies engineered into modern, high-performance computing software. Using the Bounce method in the calculation of non-energy-related properties, those represented by operators that do not commute with the Hamiltonian, is a novel work. We found that the unmodified Bounce gives good ground state energy and very good one-electron properties. We attribute this to its favourable time-reversal symmetry in its target density's Green's functions. Breaking this symmetry gives poorer results. Use of a short reptile in the Bounce method does not alter the quality of the results. This suggests that in future applications one can use a shorter reptile to cut down the computational time dramatically.
Resumo:
Formal verification of software can be an enormous task. This fact brought some software engineers to claim that formal verification is not feasible in practice. One possible method of supporting the verification process is a programming language that provides powerful abstraction mechanisms combined with intensive reuse of code. In this thesis we present a strongly typed functional object-oriented programming language. This language features type operators of arbitrary kind corresponding to so-called type protocols. Sub classing and inheritance is based on higher-order matching, i.e., utilizes type protocols as basic tool for reuse of code. We define the operational and axiomatic semantics of this language formally. The latter is the basis of the interactive proof assistant VOOP (Verified Object-Oriented Programs) that allows the user to prove equational properties of programs interactively.
Resumo:
Hub Location Problems play vital economic roles in transportation and telecommunication networks where goods or people must be efficiently transferred from an origin to a destination point whilst direct origin-destination links are impractical. This work investigates the single allocation hub location problem, and proposes a genetic algorithm (GA) approach for it. The effectiveness of using a single-objective criterion measure for the problem is first explored. Next, a multi-objective GA employing various fitness evaluation strategies such as Pareto ranking, sum of ranks, and weighted sum strategies is presented. The effectiveness of the multi-objective GA is shown by comparison with an Integer Programming strategy, the only other multi-objective approach found in the literature for this problem. Lastly, two new crossover operators are proposed and an empirical study is done using small to large problem instances of the Civil Aeronautics Board (CAB) and Australian Post (AP) data sets.
Resumo:
Feature selection plays an important role in knowledge discovery and data mining nowadays. In traditional rough set theory, feature selection using reduct - the minimal discerning set of attributes - is an important area. Nevertheless, the original definition of a reduct is restrictive, so in one of the previous research it was proposed to take into account not only the horizontal reduction of information by feature selection, but also a vertical reduction considering suitable subsets of the original set of objects. Following the work mentioned above, a new approach to generate bireducts using a multi--objective genetic algorithm was proposed. Although the genetic algorithms were used to calculate reduct in some previous works, we did not find any work where genetic algorithms were adopted to calculate bireducts. Compared to the works done before in this area, the proposed method has less randomness in generating bireducts. The genetic algorithm system estimated a quality of each bireduct by values of two objective functions as evolution progresses, so consequently a set of bireducts with optimized values of these objectives was obtained. Different fitness evaluation methods and genetic operators, such as crossover and mutation, were applied and the prediction accuracies were compared. Five datasets were used to test the proposed method and two datasets were used to perform a comparison study. Statistical analysis using the one-way ANOVA test was performed to determine the significant difference between the results. The experiment showed that the proposed method was able to reduce the number of bireducts necessary in order to receive a good prediction accuracy. Also, the influence of different genetic operators and fitness evaluation strategies on the prediction accuracy was analyzed. It was shown that the prediction accuracies of the proposed method are comparable with the best results in machine learning literature, and some of them outperformed it.
Resumo:
Cette recherche a pour objet l'étude de la dynamique de transformation du métier d'ingénieur dans le contexte algérien saisi à travers le rapport au travail. Elle repose sur une approche théorique s'inspirant d'une sociologie des groupes professionnels avec une démarche alliant méthodes quantitatives et qualitatives. Prenant appui sur des données recueillies à l'aide d'un questionnaire et d'entretiens approfondis menés dans Sonatrach, la plus grande entreprise d'Algérie, notre étude s'est attachée à faire ressortir les facteurs qui agissent au niveau individuel, organisationnel et sociétal sur les pratiques professionnelles pour deux générations d'ingénieurs. La première a eu pour mission de bâtir le pays à travers les grands projets de développement qui ont caractérisé la période après l'indépendance. La deuxième est arrivée sur le marché de l'emploi, à la fin des années 80, dans un contexte de crise et a payé un lourd tribut à la détérioration de la conjoncture économique. Les pratiques professionnelles se construisent tout d'abord dans le travail, mais aussi dans l'exercice des activités quotidiennes, les relations avec les autres et enfin la satisfaction à l'égard du travail. Tels ont été les points focaux de notre démarche d'explicitation du rapport au travail chez nos ingénieurs. Nous avons mis en lumière l'effet de la position hiérarchique au sein de l'organisation et des types de fonction. La satisfaction tient de la fierté d'appartenir à une entreprise prestigieuse. Chez les jeunes, elle s'exprime aussi dans les avantages matériels et une vision du métier fondée sur la maîtrise technique. Les plus âgés, encore marqués par l'idéologie nationaliste, mettent l'accent sur la participation à l'édification du pays, mais aussi sur la réalisation de soi et la fidélité à l'entreprise. Le rapport au travail s'élabore également au fil du temps dans son cheminement professionnel. Nous l'avons abordé, dans une deuxième étape, en documentant les processus d'intégration et de mobilité au sein de l'entreprise. Les trajectoires professionnelles sont régies par des politiques et des procédures de gestion qui en définissent les modalités, mais elles obéissent également à des opportunités et à des pratiques informelles qui jouent un rôle tout aussi important dans la détermination des profils de carrière. Enfin, le rapport au travail est tributaire de facteurs qui dépassent le cadre de l'entreprise. Dans une troisième étape, nous avons analysé les transformations du système éducatif et leur impact sur la certification des ingénieurs, la crise économique et ses effets en termes de chômage et de précarité et enfin la montée du discours religieux et ses manifestations chez les ingénieurs. Ces facteurs liés au contexte sociétal modifient les représentations et modèlent les attitudes et comportements au travail et à l'égard de celui-ci. Comme le montre notre recherche, le rapport au travail articule, dans une composition complexe, parcours individuels et histoires collectives vécus dans des environnements en évolution. La pratique d'un métier se trouve liée aux différents contextes de socialisation qui traversent les individus. Elle se situe, dans le cas algérien, au croisement d'une formation scientifique et technique qui montre peu de réactivité aux besoins mouvants de l'opérateur économique qu'elle est censée satisfaire, d'une entreprise bureaucratique dans son organisation et dans son fonctionnement où le contournement des règles peut s'ériger en principes de gestion et enfin d'un contexte sociétal qui oscille entre modernité et tradition. Cette dernière est réinterprétée de manière orthodoxe par les mouvements religieux en action dans la société. Ainsi, les ingénieurs investis initialement d'une mission de développement et considérés alors comme "vecteur de modernité" connaissent une détérioration de leur statut et la crise touche la profession vécue cependant différemment selon les générations.
Resumo:
"Thèse présentée à la Faculté des études supérieures de l'Université de Montréal en vue de l'obtention du grade de Docteur en droit (LL.D.) et à l'Université Panthéon-Assas (Paris II) Droit-économie-Sciences Sociales en vue de l'obtention du grade de Docteur en droit (Arrêté du 30 mars 1992 modifié par l'arrêté du 25 avril 2002)"
Resumo:
Le rôle intégratif que la Cour de justice des Communautés européennes (CJCE) a joué dans la construction européenne est bien connu et très documenté. Ce qui l'est moins ce sont les raisons qui l'ont motivé, et le motivent encore. Si certains se sont déjà penchés sur cette question, un aspect a néanmoins été complètement négligé, celui de l'influence qu'a pu avoir à cet égard le contexte conjoncturel sur la jurisprudence communautaire et plus précisément sur l'orientation que la Cour a choisi de lui donner. Dans ce cadre, les auditoires de la Cour ont un rôle déterminant. Pour s'assurer d'une bonne application de ses décisions, la Cour est en effet amenée à prendre en considération les attentes des États membres, des institutions européennes, de la communauté juridique (tribunaux nationaux, avocats généraux, doctrine et praticiens) et des ressortissants européens (citoyens et opérateurs économiques). Aussi, à la question du pourquoi la CJCE décide (ou non) d'intervenir, dans le domaine de la libre circulation des marchandises, en faveur de l'intégration économique européenne, j'avance l'hypothèse suivante: l'intervention de la Cour dépend d'une variable centrale : les auditoires, dont les attentes (et leur poids respectif) sont elles-mêmes déterminées par le contexte conjoncturel. L'objectif est de faire ressortir l'aspect plus idéologique de la prise de décision de la Cour, largement méconnu par la doctrine, et de démontrer que le caractère fluctuant de la jurisprudence communautaire dans ce domaine, et en particulier dans l'interprétation de l'article 28 du traité CE, s'explique par la prise en compte par la Cour des attentes de ses auditoires, lesquels ont majoritairement adhéré à l'idéologie néolibérale. Afin de mieux saisir le poids - variable - de chaque auditoire de la Cour, j'apprécierai, dans une première partie, le contexte conjoncturel de la construction européenne de 1990 à 2006 et notamment le virage néolibéral que celle-ci a opéré. L'étude des auditoires et de leur impact sur la jurisprudence fera l'objet de la seconde partie de ma thèse. Je montrerai ainsi que la jurisprudence communautaire est une jurisprudence « sous influence », essentiellement au service de la réalisation puis de l'approfondissement du marché intérieur européen.